# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
fc5b5ccbe2665517f9f2a7fdeedda6fe3ecee866ed274fb4e84217ca7f23b112
Pseudo Output
9e9c26d157db29c1621387b73829a397735ed21105f138406547d6ab9a624b2f
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
e4004948543a2d473a941a2e4f785f2dd8cc9575b143efd84a5bfe72e7fedc15
Commitment
20788aa3934f2817e6d12b1a73d7ed292d47853921c83e42cfa01adb88ae8325
Range Proof
672 bytes (Bulletproof)
Memo
14378e7ac1c53797e9c50c1368581831722721404d5c78c047bc830a556cf707e9105587aaed9cbec76b0cbf512018304d576d1a1393a0c6995b070b883519b8be837094ab39e2a16121e24a7f14614e3934f0ad23ece9349539a47770cc51ccd3a0e23648a5708d409cfe2b6fe8d6a7d68c09b194cf3a4715e9e057a9f6cf21 (encrypted)
Stealth Address
322dc462f9a31ce8064dea79c67584eda122dd7efc3b47db46c5e0c59633d860
Commitment
7419b746a0db954a832e5dd20f2aa66c51abccb78fff0b1134f45cc4b6fea711
Range Proof
672 bytes (Bulletproof)
Memo
9c4647d6a143fc5ebe1465fdb5f3a8d5d3bf5f63a12bc9c164e7df828602c35748e3ca82b3ca9cd5b213ebfe094d044f7a1b545ea6cba73a7b124ce4b94874441a2866aeafe219a7822c97a3b2601de3677ef6ef8b72c959ba6f4e3c954b1c1c7cd6c2b4da21cebbdb78d9e27419670374aad13fb7bedab67309b8f27f0fd33e (encrypted)
Stealth Address
3886a2b443265adbb9d32d5f0ead7332093c1db1bfec195c5b45f0a99f8de452
Commitment
9226ae60d45b23973e938c9ed5e274823c5fe780293ab90ad116408c1de4d770
Range Proof
672 bytes (Bulletproof)
Memo
bc2213f0438344217cf9c37a408d4b407c7deb68c8ec60c562dbd432d94c1cc50e200bf7a409ce364750ff332a34cfd6dde51afc7fb114d2db503c9eed60ffc2be0356c57a6ffbd0a1315f12033beaba6b6e0c05fc95de38058428af19777e758791e771eec5fcd18c8b73ae4d7bc8a9ad3a65687345da08ffa303ba69ddc29c (encrypted)